SHARE - Call For Presentations

Call For Presentations

Winter 2014 Anaheim
Sunday, March 9, 2014 - Friday, March 14, 2014
Anaheim, CA

Share |

Suggested Hot Topics for 2014

Cloud in the Enterprise
Cloud computing is not just vaporware anymore. IT organizations are adopting cloud as a service paradigm that has supporting infrastructure and software technologies. They are deploying private clouds in order to manage access, security and reliability. How does a business choose between build vs buy? How might they use cloud as a resource for disaster recovery, business continuity or business resilience?

Security in the Enterprise
In today's extended compute environment of big business data, increased usage of mobile devices and incorporation of social into the business environment the potential security threats and increased need for having the ultimate security protection of data and transactions is the top of the list for businesses. The cloud computing model offers some security, often at one size fits all, with unknown risks typically borne by the organization.. The ability to control access points according to corporate policy and in compliance with governmental policies is changing the way corporations set up their systems and prepare for audits. Consider including security disciplines ranging from intrusion detection, data access and protection, user identification and authentication, encryption, key management, auditing and compliance, and more!

Mobile and Social Networking in the Enterprise
Mobile devices and Social Networking have taken off at an astonishing rate, and that trend is only going to continue. This explosion is certainly making its presence felt in the corporate world. IT needs to take control of the situation quickly. But what exactly should we be concerned about? Security? Performance? Capacity? What policies need to change? What automation options are available?

The Dark Side of Virtualization
We all understand the efficiencies that can be realized with virtualization such as reduction of power needs, reduction of space needs and improved reliability. But do we understand the issues that virtualization may introduce in terms of management complexity, security, performance and privacy. For example, when you create a virtual LAN to connect virtual systems, how do you do intrusion detection or provide some service like firewall? Now that we have hundreds of guest servers, how are we going to perform maintenance on the hosting system?

Big Data - Big Analytics - Big Needs
We have seen the opportunities to manage Big Data and derive benefits never before realizable. But do we comprehend the underlying requirements for bandwidth, processing capacity and storage capacity? Do we have a plan to manage those as well as the inherent security, compliance and privacy issues? Do you have any plan to manage personally identifiable information (PII) in that environment? With all that accomplished, now how do we deliver the data to the processes that will analyze it? What parts of our business would benefit most if we manage to solve these issues?

SHARE, it’s not an acronym; it’s what we do!




Submitting a Session

Please click on the arrow next to each session type below to read full Program descriptions and to access the submission links for each session type. Unless you are familiar with the Program structure of SHARE, please select 'General Submissions' as the topic for your submission.

The deadline for submitting a session is Friday, October 4, 2013.


Application Architecture Development

Enterprise Data Center

General Submissions

Information Management

Linux & VM

MVS

SHARE-wide



To Login to an Existing Session

If you have already submitted a Session and you wish to VIEW, RESUME, EDIT or WITHDRAW that submission, then log in below using the Session ID Number and Password already provided to you:

Session ID#        Password        

Lost Password? Click here and we will send you another email with a link to your submission.